Skip to content
Tech News
← Back to articles

Nearly 4,000 US industrial devices exposed to Iranian cyberattacks

read original get Industrial Cybersecurity Kit β†’ more articles
Why This Matters

The exposure of nearly 4,000 US industrial devices to Iranian cyberattacks highlights significant vulnerabilities in critical infrastructure cybersecurity. This ongoing threat underscores the urgent need for robust defense measures to protect essential systems from nation-state actors, which can lead to operational disruptions and financial losses for industries and consumers alike.

Key Takeaways

The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation.

According to a joint advisory issued by multiple U.S. federal agencies on Tuesday, Iranian state-backed hacking groups have been targeting Rockwell Automation/Allen-Bradley PLC devices since March 2026, causing operational disruptions and financial losses.

"Iranian-affiliated APT targeting campaigns against U.S. organizations have recently escalated, likely in response to hostilities between Iran, and the United States and Israel," the authoring agencies warned.

"The FBI identified that this activity resulted in the extraction of the device's project file and data manipulation on HMI and SCADA displays."

As cybersecurity firm Censys reported one day later, three-quarters of more than 5,200 such industrial control systems found exposed online globally are from the United States.

"Censys data identifies 5,219 internet-exposed hosts globally responding to EtherNet/IP (EIP) and self-identifying as Rockwell Automation/Allen-Bradley devices," Censys said.

"The United States accounts for 74.6% of global exposure (3,891 hosts), with a disproportionate share on cellular carrier ASNs indicative of field-deployed devices on cellular modems."

Internet-exposed Rockwell/Allen Bradley PLCs (Censys)

​To defend against these ongoing attacks, network defenders are advised to secure PLCs using a firewall or disconnect them from the Internet, scan logs for signs of malicious activity, and check for suspicious traffic on OT ports (especially when it originates from overseas hosting providers).

Admins should also enforce multifactor authentication (MFA) for access to OT networks, keep all PLC devices up to date, and disable unused services and authentication methods.

... continue reading